Description
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, macOS Ventura 13.7.5. Parsing a maliciously crafted file may lead to an unexpected app termination.
Published: 2025-01-27
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Unexpected Process Termination
Action: Upgrade Versions
AI Analysis

Impact

A crafted file processed by macOS can trigger a crash of the responsible application, resulting in termination without corrupting system data. The vulnerability stems from improper bounds checking, which aligns with CWE‑787. Because the failure occurs during parsing, an attacker can make the application exit unexpectedly, disrupting user activity or services that rely on that application.

Affected Systems

Apple’s macOS operating systems are affected. Versions older than macOS Sequoia 15.3, macOS Sonoma 14.7.3, and macOS Ventura 13.7.5 remain vulnerable. The fixed releases listed as Sequoia 15.3, Sonoma 14.7.3, Ventura 13.7.3 and Ventura 13.7.5 all contain the necessary checks that prevent the crash.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity for denial of service. The EPSS score of less than 1 % suggests a very low likelihood of widespread exploitation in the near future, and the vulnerability is not listed in the CISA KEV catalog. Exploitation appears to require the delivery of a maliciously crafted file to the target machine, typically via download or email attachment, and then opening it with the vulnerable application. As such, the attack vector is likely local or remote through user interaction, but no public exploit is currently known.

Generated by OpenCVE AI on April 28, 2026 at 04:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade your macOS installation to the latest release that includes Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.5.
  • If an upgrade is not immediately possible, avoid opening files from untrusted or suspicious sources until the system is updated.
  • Regularly check Apple’s support pages (e.g., https://support.apple.com/en‑us/122068) for security updates and install any additional patches as they become available.

Generated by OpenCVE AI on April 28, 2026 at 04:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3647 The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination.
History

Tue, 28 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Title Unexpected Application Termination via Malicious File on macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination. The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, macOS Ventura 13.7.5. Parsing a maliciously crafted file may lead to an unexpected app termination.
References

Mon, 03 Nov 2025 21:30:00 +0000


Mon, 24 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 03 Mar 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Tue, 18 Feb 2025 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:13:34.816Z

Reserved: 2025-01-17T00:00:44.975Z

Link: CVE-2025-24139

cve-icon Vulnrichment

Updated: 2025-11-03T21:03:42.155Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:18.627

Modified: 2026-04-02T19:19:06.070

Link: CVE-2025-24139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:15:16Z

Weaknesses